Usi sing Dig g Digit ital al For oren ensi sics cs to to Id - - PowerPoint PPT Presentation

usi sing dig g digit ital al for oren ensi sics cs to to
SMART_READER_LITE
LIVE PREVIEW

Usi sing Dig g Digit ital al For oren ensi sics cs to to Id - - PowerPoint PPT Presentation

Usi sing Dig g Digit ital al For oren ensi sics cs to to Id Iden enti tify & I y & Inves esti tiga gate te Fr Frau aud Pr Present nter: Damon on Hack cker, MBA, , CCE, E, CISA SA Preside ident Vestige ige


slide-1
SLIDE 1

Usi sing Dig g Digit ital al For

  • ren

ensi sics cs to to Id Iden enti tify & I y & Inves esti tiga gate te Fr Frau aud

Pr Present nter: Damon

  • n Hack

cker, MBA, , CCE, E, CISA SA Preside ident Vestige ige Digit igital I l Inv nves estiga igations tions

slide-2
SLIDE 2

Ves ●tige (véŝ tĭj) n. 1. A visible trace, evidence or sign of something that has once existed but now no longer exists or appears.

slide-3
SLIDE 3

Overview

  • Open Your Eyes
  • Real-World Scenarios
  • What Computer Forensics Can and Cannot Do
  • Forensic Techniques Overview/Primer
  • What You Need to Know
  • Q&A
slide-4
SLIDE 4

Xerox DocuColor 12 page, magnified 10x and photographed by the QX5 microscope under illumination from a Photon blue LED flashlight

slide-5
SLIDE 5
slide-6
SLIDE 6

Scenarios

  • Real-World Examples
  • Vestige Involved
  • Some Information is in Public Domain, Most is Not.
  • Information Changed to Protect the identities of those involved.
  • May be a compilation of more than one case to make a specific point or further protect

identities.

slide-7
SLIDE 7

Scenario 1

  • The Scene:
  • Wrongful Termination lawsuit
  • Sending of “over-the-top” e-mails
  • Two places at once?
slide-8
SLIDE 8
slide-9
SLIDE 9
slide-10
SLIDE 10

So, , where do we turn?

slide-11
SLIDE 11

I.T.’s Findings

  • Tracked IP Address

Deposition ends: 11:15am in Detroit

  • How can this be?
slide-12
SLIDE 12

I.T.’s Findings

  • Ventura, California
slide-13
SLIDE 13
  • Registration/Login
  • Payment Method
  • Surveillence

Kinko’s Kooperates

slide-14
SLIDE 14

Results

slide-15
SLIDE 15

Scenario 2

  • Tail-end of litigation
  • Plaintiff wins matter and is awarded attorneys fees
  • Disparate amounts spent between plaintiff & defendant
  • Defendant’s counsel believes Plaintiff’s counsel has “stuffed” time

entry

slide-16
SLIDE 16

Scenario 2

  • Review of Time & Billing Software
  • No apparent manipulation
  • Chronology looked appropriate
  • Defendant’s analysis concluded no manipulation.
slide-17
SLIDE 17

Scenario 2

  • Vestige Analysis
  • Review of database, behind-the-scenes
  • Time & Billing software uses off-the-shelf back-end database,

albeit not a common one

  • Vestige tools to review data at database level
  • Vestige created “parsing” utility to extract and review deleted

records

slide-18
SLIDE 18

Scenario 2

  • Analysis reviewed approximately 40% overbilling occurring
  • “Stuffing” time entries sequentially at end of case
  • Replacement entries that were 2x-10x the amount of the deleted

entries they replaced

  • Adjustment and sanctions
slide-19
SLIDE 19

Scenario 3

  • $30 Million shortage in commodities
  • $3 Billion company
  • 3000+ employees
  • 100s of thousands financial transactions
  • No initial persons of interest

Hypothesis: Internal controls would require collusion to pull off fraud. Individuals ought to be communicating with one another.

slide-20
SLIDE 20

Scenario 3

1. Take backup tape from email system last year 2. Take backup tape from email system last month 3. Index every word and frequency per user 4. Import word Index, frequency per user, and frequency count into Excel 5. Using Excel calculate median frequency per user for each word 6. Identify words having frequency per user far greater than median

  • Led to determination of “do you want cheese with that?”

in excess of 2000% greater than median frequency for 3 individuals

slide-21
SLIDE 21

Scenario 3

  • Requests for financial statements accompanied by

“Do you want cheese with that?”

  • Innocuous sounding word/phrase
  • Not in selection set for typical keyword search
slide-22
SLIDE 22

Scenario 4

  • Stolen Laptops
  • Law Enforcement’s involvement
  • Stupidity at its finest
slide-23
SLIDE 23

Scenario 5

  • Wage/Hour Class Action
  • Non-Exempt classified as Exempt
  • Timeframe stretches back 3-4 years
slide-24
SLIDE 24

By the Numbers

Fraud Statistics

slide-25
SLIDE 25

Typical Fraud

  • Typical organization loses 5% of annual revenues to various frauds
  • $6.3 TRILLION issue worldwide
  • Median loss $150,000
  • In 94.5% of cases in study, perpetrator took efforts to conceal the

fraud!

Source: 2016 Report to the Nations on Occupational Fraud and Abuse. The Association of Certified Fraud Examiners

slide-26
SLIDE 26

Detecting Fraud

  • Time to detection – median is 18 months
  • How Fraud was Detected:
  • Tip – 39.1%
  • Internal Audit – 16.5%
  • Management Review – 13.4%
  • By Accident – 5.6%
  • Account Reconciliation – 5.5%
  • External Audit – 3.8%
slide-27
SLIDE 27

Controls

  • Strong linkage between anti-fraud controls:
  • Significant decrease in cost
  • Decrease in duration of time-to-detection
slide-28
SLIDE 28

Perpetrator

  • 94.5% are first-time offenders
  • Clean employment history
  • No criminal background
  • 79% of cases, perpetrator exhibited “red flag” behavior
  • Living beyond means
  • Financial Difficulties
  • Unusually close association with vendors/clients
  • Excessive control issues/wheeler-dealer attitude
  • Recent divorce / family problems
slide-29
SLIDE 29

Why People Commit Fraud

  • The Psychology of Fraud

Rationalization

slide-30
SLIDE 30

In Intersection of f Technology & Fraud

  • Opportunity
  • Majority of financial transactions are Technology-linked
  • Less tangible – belief its harder to get caught
  • Availability of software
  • Personal accounting software
  • Document alteration
  • Access to information
  • Research on techniques & cover-up
slide-31
SLIDE 31

What Dig igit ital Forensics Can and Cannot Do

slide-32
SLIDE 32
slide-33
SLIDE 33

What you can expect

  • Content
  • Keyword search for content/communication
  • ALL correspondence
  • Hidden information
  • Deleted information
  • Orphaned information
  • Encrypted information
slide-34
SLIDE 34
  • Correspondence
  • Memos
  • Emails
  • Instant messages
  • Faxes
  • Deleted
  • Old and forgotten
slide-35
SLIDE 35
  • Business Records
  • Financial data
  • Assets
  • Calculations
  • PRIOR DRAFTS
  • DELETED DRAFTS
  • Projections
  • Everything you could imagine
slide-36
SLIDE 36
  • Every Website visited
  • All pictures from those

websites

  • Every Website from

popups and popunders

  • All maps, from

Mapquest for example

slide-37
SLIDE 37

Every INTERNET SEARCH & the Search Results

slide-38
SLIDE 38

What you can expect

  • Conceptual Analysis
  • How the computer was used
  • IM activity – dates/times, frequency, who
  • E-mails – activity
  • Web-based E-mails
  • Deletion activity
  • Wiping activity
  • Software installed
  • File Transfers
  • CD/DVD burning
  • Attached hardware
  • Other networks attached
  • Remote Access activity
  • Do we have the “Right” system?
slide-39
SLIDE 39

What you can expect

  • Condition of evidence
  • Used by others
  • Formatted
  • Re-partitioned
  • Damaged
  • Wiped/Cleansed/Sanitized
slide-40
SLIDE 40

What Digital Forensics Can’t Do

  • Find evidence that isn’t there
  • Never was on this evidence
  • May have been on this evidence but was overwritten
  • Wrong Interpretations
  • Artifact analysis
  • Example: Defragmenting
  • “Who was at the keyboard?”

Some analysis will allow the answer to be inferred.

slide-41
SLIDE 41

Sample Case

slide-42
SLIDE 42

What You Need to Know

slide-43
SLIDE 43

Locard’s Exchange Pri rinciple

“In forensic science, Locard’s principle holds that the perpetrator of a crime will bring something into the crime scene and leave with something from it – both of which can be used as forensic evidence.”

slide-44
SLIDE 44

Sources vs Documents

  • Identify Appropriate “Key” Devices
  • Key-players
  • Expanded Key-players
  • Administrative Assistants
  • Other likely correspondents, etc.
  • Observing Devices
  • Monitors, surveillance
  • Pass-Thru Devices
  • Routers, firewalls, servers, monitoring systems
  • Passive Devices
  • i.e. conveyor
slide-45
SLIDE 45

Evidence Vola latility

  • Rate at which evidence disappears

Registers, Cache Memory, Routing Tables, Process Tables Temporary Files Disk & Other “permanent” storage Logging & Monitoring Data Archives

slide-46
SLIDE 46

Potential Sources

  • ISP
  • Router
  • Firewall
  • IDS/IPS
  • Managed Switches
  • Servers
  • Workstations
  • Other monitoring devices

(alarm system)

  • Log files
  • GPS
  • Cell Tower Data
  • Syslog
  • Honeypot
  • Virtual Machines
  • Cloud Service
  • General Network Sniffers
  • Backup tapes/disks
  • Replication sites
  • Disaster Recovery sites
  • Digital Scale & other Measuring Devices
  • RFID Data
  • “Black Boxes”
  • Video Surveillance
  • Payment or other Registration Info
slide-47
SLIDE 47

Methodology

slide-48
SLIDE 48

Acquisition Authentication Analysis Presentation

slide-49
SLIDE 49

Acquisition

  • First & Foremost: Evidence Preservation
  • Admissibility in Court
  • Protection of All Parties Involved…

even the investigator

  • Avoid Contamination/Spoliation of Evidence
slide-50
SLIDE 50

Acquisition

  • Completeness
  • “The Whole Truth”
  • Used & Unused (Unallocated) Space
  • Active & Inactive Systems
  • Seemingly “Inaccessible” Systems & Media
slide-51
SLIDE 51

Acquisition

  • Methodology
  • Forensically-sound Bit-for-Bit Clone
  • Copy, clone, mirror
  • Write-protect
  • Place on Sterile Media
  • MD5 or other authentication hash
  • Chain of Custody
  • Seal Evidence
slide-52
SLIDE 52

Authentication

  • Authenticate:
  • Prove “no change”
  • Prove Clones ARE the Same
  • Method
  • MD5 Hash (digital fingerprint)
  • Industry-standard, industry-recognized
  • 128-bit
  • 1 in 1x1038 chance for deceiving
  • 1 in 100,000,000,000,000,000,000,000,000,000,000,000,000
  • DNA Evidence is 1 in 1,000,000,000
slide-53
SLIDE 53

Authenticate

  • Our Methodology
  • MD5 Hash – Digital Fingerprint

702865f9ebd7478fbab050ed6b4612f0 MD5

slide-54
SLIDE 54

Authenticate

  • Prove copies (working) are the same

702865f9ebd7478fbab050ed6b4612f0 702865f9ebd7478fbab050ed6b4612f0

COPY

slide-55
SLIDE 55

Authenticate

  • Prove nothing has changed

702865f9ebd7478fbab050ed6b4612f0 702865f9ebd7478fbab050ed6b4612f0

slide-56
SLIDE 56

Analysis

  • Leave No Stone Unturned
  • Used (active) space
  • Unused (inactive/unallocated) space
  • Slack space
  • Deleted – partially, separation of metadata and content
  • Artifacts
  • Printed documents
  • E-mail / IM / chat sessions
  • Internet History
slide-57
SLIDE 57

Analysis

  • Hiding activity
  • Encryption
  • Mismatched document types
  • Steganography
  • Date Analysis
  • MAC Dates
  • Metadata
slide-58
SLIDE 58

Analysis

  • Installed Software
  • Use of software
  • Installed
  • Permissions
  • First Use
  • Last Use
  • Registration
  • Settings
  • Number of times used / Frequency of use
  • Removed Software
slide-59
SLIDE 59

Analysis

  • Hardware
  • Installed hardware
  • Removed hardware
slide-60
SLIDE 60

Analysis

  • Nefarious Activities
  • Wiping
  • Encryption
  • Booby Traps
  • Analysis of “Trojan Defense”
slide-61
SLIDE 61

Beyond Sampling…

Advanced Analytics to Find the Needle in the Haystack

slide-62
SLIDE 62

Vir irtualization

  • Run the application as intended
  • Sometimes the only solution
  • Allows for reverse-engineering
  • Testing of artifacts
slide-63
SLIDE 63

Behind-the-Scenes

  • But…
  • The most valuable information comes from

what we can gain access to apart from the constraints of the application and its interface.

slide-64
SLIDE 64

Structure of f Accounting Systems

  • Front-end Application
  • Back-end Data
  • Standard Database
  • Proprietary Database
slide-65
SLIDE 65

CAATTs

  • Computer Assisted Audit Tools & Techniques
  • Use of computers to automate process
  • Specialized software tools
  • ACL, IDEA, Picalo
  • General data manipulation software tools
  • Excel, Access, SQL db, SAS
slide-66
SLIDE 66

Statistical Approach

slide-67
SLIDE 67

Anomalies

  • Duplicates
  • Threshold Analysis
  • Outliers
slide-68
SLIDE 68

Statistical Approach

  • General Fingerprinting
  • Min / Max
  • Mean / Median
  • Standard Deviation / Distribution
  • Three Tools
  • Data Profile
  • Data Histogram
  • Periodic Graph
slide-69
SLIDE 69

Statistical Approach

  • 3 Tools – What do they tell us?
  • Data Completeness
  • Negative (contra) amounts
  • High proportion of high-value / low-value transactions
  • Presence of Zero transactions
  • Detect possible deviances
slide-70
SLIDE 70

Example

  • Simple
  • AP Check Register
  • Data Profiling
  • Missing checks
  • Duplicate checks
  • Threshold analysis
  • Outlier analysis
slide-71
SLIDE 71
slide-72
SLIDE 72
slide-73
SLIDE 73
slide-74
SLIDE 74

Traditional Approach vs. . Analytics

  • Analytics
  • Relating Disparate Data
  • Examples:
  • Vendor EIN to HR database of employee’s SSN
  • Addresses to employee’s addresses
  • Related Disparate Sources
  • Examples:
  • EIN numbers against known invalid SSNs (i.e. IRS’ list of invalid SSNs, deceased individuals)
slide-75
SLIDE 75

Traditional Approach vs. . Analytics

  • Analytics
  • Pattern Recognition
  • Transactions just under signing threshhold
  • Transactions processed on Sat/Sun
  • Transactions processed after H:MM
  • Number of transactions processed
  • Large transactions to new vendor
  • Analytics
  • Benford’s Law
  • TF/IDF
slide-76
SLIDE 76

Work rking wit ith Raw Data

slide-77
SLIDE 77

Fin inding Dupli licates

slide-78
SLIDE 78

Repeat Transactions

slide-79
SLIDE 79

Threshold Analysis

slide-80
SLIDE 80

Day of f Week Analysis

  • Actual Processing Date,

Not Transaction Date

slide-81
SLIDE 81
slide-82
SLIDE 82

Deep-Dive

  • n Specific Vendors
slide-83
SLIDE 83

Analysis

  • Data not available through Interface
  • Processing data
  • Autoincrement / Index fields
  • Additional Audit Trail information
  • Check Register vs Check Images
slide-84
SLIDE 84

Analysis

  • Deleted Database Records
  • Consistent amongst most databases
  • Until “packed” or “compressed”
  • Recoverable with the right tools & know-how
  • Some applications (especially financial) may maintain

multiple audit/change logs

slide-85
SLIDE 85

Analysis

  • Simple Linking
  • Disbursement to PO Amount Comparison
  • Link 2 data sources
slide-86
SLIDE 86

Analysis

  • More Complex
  • Financial System – Vendor Addresses
  • HRIS – Employee Addresses
  • Examples
  • Vendors with same TIN as EE SSN
  • Vendors with addresses same as EE
  • Multiple vendors from same address
slide-87
SLIDE 87

Social Network Analysis

  • Relationships
  • Reciprocal Relationships
  • Weighted Relationship
  • How Much
  • How Frequent
  • Closeness
  • Density
  • Connectivity
slide-88
SLIDE 88

Social Network Analysis

slide-89
SLIDE 89

Fin inding the Needle in in the Haystack

  • Oftentimes there’s a “feeling” that something is amiss
  • No hard evidence
  • Actors are unknown
  • Schemes are unknown
  • Scope of problem is unknown
slide-90
SLIDE 90

Fin inding the Needle in in the Haystack

  • Keywords?
  • Just a guess
  • Bad keywords
  • Fraud, embezzlement, steal
  • “Follow the cash”
  • Will work – but is tedious
  • Obscurity through Complexity
slide-91
SLIDE 91

Analysis

  • Analysis Tools
  • Benford’s Analysis
slide-92
SLIDE 92

Analysis

  • Benford’s Law
slide-93
SLIDE 93

What about Contextual Analysis?

  • Introducing the TF/IDF
  • Term Frequency
  • Inverse Document Frequency
  • Document can be substituted with custodian
slide-94
SLIDE 94

TF/ID IDF – In Information Retrieval Theory ry

slide-95
SLIDE 95

Analysis

  • Analysis Tools
  • Benford’s Analysis
  • Pajek: Social Network

Analysis

  • Statistical Analysis: Excel,

Access, mySQL

slide-96
SLIDE 96

Summary ry

  • Data can exist as Active and Deleted
  • Content vs Artifact
  • Fraud is a huge issue and increasingly problematic
  • Scope is difficult to ascertain initially
  • Traditional approaches lack ability to quickly and effectively pinpoint

issues

  • Statistical analysis can greatly assist in this area
slide-97
SLIDE 97

Clo losing Thoughts

A: Involve a Digital Forensic Expert early

  • Ability to plan discovery strategy
  • Ensure admissibility
  • Work closely with client

Q: What to do when faced with Electronic Data?

slide-98
SLIDE 98

And the # 1 reason…

If you think hiring an Expert is expensive… wait until you’ve hired an amateur!

slide-99
SLIDE 99

Damon S. Hacker, MBA, CCE, CISA Cleveland | Columbus | Pittsburgh | National Coverage 800-314-4357 dhacker@vestigeltd.com www.VestigeLtd.com

Vestige Digital Investigations

Electronic Evidence Experts

We Turn Digital Evidence into Intelligence™